Journal articles on the topic 'Automation and response (SOAR)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Automation and response (SOAR).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Weil, Ramon. "Security Orchestration, Automation and Response (SOAR)." Technische Sicherheit 13, no. 11-12 (2023): 41–42. http://dx.doi.org/10.37544/2191-0073-2023-11-12-41.
Full textSabeeruddin, shaik. "The Growing Role of Security Orchestration, Automation and Response (SOAR) in SOC Operations." International Journal of Leading Research Publication 5, no. 12 (2024): 1–6. https://doi.org/10.5281/zenodo.14769600.
Full textGustina DM, Venny, and Ananda Ananda. "Kecerdasan Buatan untuk Security Orchestration, Automation and Response: Tinjauan Cakupan." Jurnal Komputer Terapan 10, no. 1 (2024): 36–47. http://dx.doi.org/10.35143/jkt.v10i1.6247.
Full textIsmail, Rahmat Kurnia, Zilmas Arjuna Brata, et al. "Toward Robust Security Orchestration and Automated Response in Security Operations Centers with a Hyper-Automation Approach Using Agentic Artificial Intelligence." Information 16, no. 5 (2025): 365. https://doi.org/10.3390/info16050365.
Full textDas, Anauksa. "Automation and Orchestration in Cyber Threat Intelligence (CTI): A Survey." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 1964–70. https://doi.org/10.22214/ijraset.2025.72574.
Full textKotliarov, O. Y., and L. L. Bortnik. "OVERVIEW OF THE FUNDAMENTAL MODEL OF SECURITY ORCHESTRATION, AUTOMATION, AND RESPONSE IN THE CONTEXT OF CYBERSECURITY OF VIRTUAL NETWORKS." Computer systems and network 7, no. 1 (2025): 160–75. https://doi.org/10.23939/csn2025.01.160.
Full textThakker, Aastha, Aditya More, and Kapil Kumar. "Automated Defense Against Application-Layer Attacks on Windows Systems Using Wazuh and Shuffle." International Journal of Education, Science, Technology, and Engineering (IJESTE) 8, no. 1 (2025): 45–57. https://doi.org/10.36079/lamintang.ijeste-0801.842.
Full textSujan Kumar, Kummari. "Next-Generation Security Operations: Leveraging Automation for Proactive Threat Mitigation." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43432.
Full textJaiswal, Bhargav Dilipkumar. "Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response." International Journal of Scientific Research and Management (IJSRM) 13, no. 02 (2025): 1958–80. https://doi.org/10.18535/ijsrm/v13i02.ec03.
Full textSuchismita, Chatterjee. "Using SIEM and SOAR for Real-Time Cybersecurity Operations in Oil and Gas." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 6, no. 2 (2020): 1–11. https://doi.org/10.5281/zenodo.14598693.
Full textChintan Udeshi. "The Role of Automation and Platformization in Enhancing Enterprise Cybersecurity." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2984–90. https://doi.org/10.32628/cseit251112314.
Full textReddy Pulyala, Srinivas, Avinash Gupta Desetty, and Vinay Dutt Jangampet. "The Impact of Security Orchestration, Automation, and Response (SOAR) on Security Operations Center (SOC) Efficiency: A Comprehensive Analysis." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (2019): 1545–49. http://dx.doi.org/10.61841/turcomat.v10i3.14323.
Full textRamakrishnan, Shanmugavelan, and Dinesh Reddy Chittibala. "Enhancing Cyber Resilience: Convergence of SIEM, SOAR, and AI in 2024." International Journal of Computing and Engineering 5, no. 2 (2024): 36–44. http://dx.doi.org/10.47941/ijce.1754.
Full textPitkar, Harshad. "Cloud Security Automation Through Symmetry: Threat Detection and Response." Symmetry 17, no. 6 (2025): 859. https://doi.org/10.3390/sym17060859.
Full textKasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems." American Journal of Networks and Communications 13, no. 1 (2024): 19–29. http://dx.doi.org/10.11648/j.ajnc.20241301.12.
Full textOluwatosin Oladayo Aramide. "AI-Driven Cybersecurity in Storage Infrastructure." World Journal of Advanced Engineering Technology and Sciences 12, no. 2 (2024): 990–1001. https://doi.org/10.30574/wjaets.2024.12.2.0270.
Full textRamya V. J. "Data-Driven Framework for Cloud Storage Security Optimization: Leveraging Predictive Analytics and Machine Learning to Enhance Threat Detection and Incident Response." Journal of Electrical Systems 20, no. 10s (2024): 6646–53. http://dx.doi.org/10.52783/jes.6721.
Full textKasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "On the Benefits of Vulnerability Data Consolidation in Application Security." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 455–62. http://dx.doi.org/10.34190/iccws.19.1.2086.
Full textIvanov, Andrei V., Ivan V. Nikroshkin, Igor A. Ognev, and Maksim A. Kiselev. "Application of the Blue Team expertise tools in the process of monitoring information systems on the example of the TI platform (Threat Intelligence)." Digital technology security, no. 2 (June 28, 2023): 34–51. http://dx.doi.org/10.17212/2782-2230-2023-2-34-51.
Full textAhmad, Siti Arpah, Muhammad Al’Imran Mohd Khairuddin, Nor Shahniza Kamal Bashah, and Nurul Aishah Ab Raman. "An integrated framework for data breach on the dark web in brand monitoring data hunting." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 3 (2025): 3162. https://doi.org/10.11591/ijece.v15i3.pp3162-3170.
Full textA.Shaji, George, S.Sagayarajan, T.Baskar, and George A.S.Hovan. "Extending Detection and Response: How MXDR Evolves Cybersecurity." Partners Universal International Innovation Journal (PUIIJ) 01, no. 04 (2023): 268–85. https://doi.org/10.5281/zenodo.8284342.
Full textPathak, Kshitij, and Nihal Nipane. "Design and Simulation of Smart Touchless Dispenser Using AT89C51 Microcontroller." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 5355–59. https://doi.org/10.22214/ijraset.2025.69596.
Full textDr., A.SHAJI GEORGE, GEORGE A.S.HOVAN, T.BASKAR, and Pandey Digvijay. "XDR: The Evolution of Endpoint Security Solutions -Superior Extensibility and Analytics to Satisfy the Organizational Needs of the Future." International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) 8, no. 1 (2021): 493–501. https://doi.org/10.5281/zenodo.7028219.
Full textHamidah, Miske Hayunia, and Siti Sri Wulandari. "PENGEMBANGAN INSTRUMEN PENILAIAN BERBASIS HOTS MENGGUNAKAN APLIKASI “QUIZIZZ”." Efisiensi : Kajian Ilmu Administrasi 18, no. 1 (2021): 105–24. http://dx.doi.org/10.21831/efisiensi.v18i1.36997.
Full textSubudhi, Srihari. "Effectiveness of AI/ML in SOAR (Security Automation and Orchestration) Platforms." International Journal of Science and Research (IJSR) 13, no. 8 (2024): 201–6. http://dx.doi.org/10.21275/mr24802085215.
Full textSmirnova, Tetiana, Liliia Konstantynova, Oksana Konoplitska-Slobodeniuk, et al. "STUDY OF THE CURRENT STATE OF SIEM SYSTEMS." Cybersecurity: Education, Science, Technique 1, no. 25 (2024): 6–18. http://dx.doi.org/10.28925/2663-4023.2024.25.618.
Full textQu, Yongxin, Yonghui Zhou, and Yunfeng Luo. "Structural Topology Optimization for Frequency Response Problems Using Adaptive Second-Order Arnoldi Method." Mathematics 13, no. 10 (2025): 1583. https://doi.org/10.3390/math13101583.
Full textHowland-Gradman, June, and Sharon Broderick. "Soar to excellence with rapid feedback and rapid response." Nursing Management (Springhouse) 33, no. 2 (2002): 43. http://dx.doi.org/10.1097/00006247-200202000-00016.
Full textАсаубаев, А. С., and Ж. Ж. Ахметова. "Artificial Intelligence and Machine Learning in SOAR." Вестник КазГЮИУ, no. 1(56) (March 10, 2023): 84–87. http://dx.doi.org/10.48501/2092.2023.14.10.004.
Full textGuduru, Sandhya. "SOAR Automation: Palo Alto Cortex XSOAR Playbooks for MISP Threat Intel Enrichment and TheHive Project Integration." International Journal of Science and Research (IJSR) 11, no. 11 (2022): 1545–48. https://doi.org/10.21275/sr22113123451.
Full textSeo, Soobin, Dustin S. J. Van Orman, Mark Beattie, Lucrezia Cuen Paxson, and Jacob Murray. "Transforming Learning Orientations Through STEM Interdisciplinary Project-Based Learning." Education Sciences 14, no. 11 (2024): 1154. http://dx.doi.org/10.3390/educsci14111154.
Full textDhungel, Rita. "SOAR as an Effective Community-based Response in Anti-Trafficking Movements." Journal of Advanced Academic Research 9, no. 1 (2022): 1–12. http://dx.doi.org/10.3126/jaar.v9i1.44039.
Full textLiu, Xiaoling, Tianyuan Zheng, Yan Jiang, et al. "Molecular Mechanism Analysis of STIM1 Thermal Sensation." Cells 12, no. 22 (2023): 2613. http://dx.doi.org/10.3390/cells12222613.
Full textGuduru, Sandhya. "Autonomous Cyber Defense: LLM-Powered Incident Response with LangChain and SOAR Integration." International Journal of Computer Science and Information Technology Research 6, no. 1 (2025): 72–82. https://doi.org/10.63530/ijcsitr_2025_06_01_008.
Full textGuduru, Sandhya. "Autonomous Cyber Defense: LLM-Powered Incident Response with LangChain and SOAR Integration." International Journal of Science and Research (IJSR) 10, no. 5 (2021): 1378–82. https://doi.org/10.21275/sr21059083032.
Full textGlaser, Maria, and André Knops. "Spatial biases in approximate arithmetic are subject to sequential dependency effects and dissociate from attentional biases." Journal of Numerical Cognition 9, no. 1 (2023): 44–64. http://dx.doi.org/10.5964/jnc.8373.
Full textMahoney, Lori, and Joseph W. Houpt. "Experience with Varied Levels of Automation Influences User Response Speed." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 64, no. 1 (2020): 1608–12. http://dx.doi.org/10.1177/1071181320641388.
Full textNewell, Allen. "Précis ofUnified theories of cognition." Behavioral and Brain Sciences 15, no. 3 (1992): 425–37. http://dx.doi.org/10.1017/s0140525x00069478.
Full textJabbar, Abdul, Qammer H. Abbasi, Nadeem Anjum, et al. "Millimeter-Wave Smart Antenna Solutions for URLLC in Industry 4.0 and Beyond." Sensors 22, no. 7 (2022): 2688. http://dx.doi.org/10.3390/s22072688.
Full textMole, Callum, Jami Pekkanen, William Sheppard, et al. "Predicting takeover response to silent automated vehicle failures." PLOS ONE 15, no. 11 (2020): e0242825. http://dx.doi.org/10.1371/journal.pone.0242825.
Full textHutchinson, Jack, Luke Strickland, Simon Farrell, and Shayne Loft. "Human behavioral response to fluctuating automation reliability." Applied Ergonomics 105 (November 2022): 103835. http://dx.doi.org/10.1016/j.apergo.2022.103835.
Full textWildey, Mary Jo, and Carol Ann Homon. "Response to: Automation Basics: Robotics vs. Workstations." Journal of Biomolecular Screening 4, no. 3 (1999): 115. http://dx.doi.org/10.1177/108705719900400302.
Full textSiva, Kumar Mamillapalli. "Streamlining Network Management with Automation." International Journal of Leading Research Publication 1, no. 4 (2020): 1–5. https://doi.org/10.5281/zenodo.14982469.
Full textCohen-Lazry, Guy, Avinoam Borowsky, and Tal Oron-Gilad. "The Effects of Continuous Driving-Related Feedback on Drivers’ Response to Automation Failures." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 1980–84. http://dx.doi.org/10.1177/1541931213601974.
Full textSuresh Vethachalam. "Cybersecurity automation: Enhancing incident response and threat mitigation." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 572–85. https://doi.org/10.30574/wjaets.2025.15.3.0972.
Full textTilbury, Jack, and Stephen Flowerday. "Automation Bias and Complacency in Security Operation Centers." Computers 13, no. 7 (2024): 165. http://dx.doi.org/10.3390/computers13070165.
Full textCalhoun, Gloria, Heath Ruff, Elizabeth Frost, Sarah Bowman, Jessica Bartik, and Kyle Behymer. "Performance-Based Adaptive Automation: Number of Task Types and Response Time Measures Triggering Level of Automation Changes." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65, no. 1 (2021): 37–41. http://dx.doi.org/10.1177/1071181321651099.
Full textShinde, Sandhya, Suchita Wayadande, Shrawni Shinde, and Raj Gurav. "MSRTC Bus Automation." International Journal of Electronics and Computer Applications 1, no. 2 (2024): 36–39. https://doi.org/10.70968/ijeaca.v1i2.3.
Full textCostanzo, Don. "AUTOMATED ICS: A FRAMEWORK FOR SUCCESS." International Oil Spill Conference Proceedings 2001, no. 2 (2001): 1033–34. http://dx.doi.org/10.7901/2169-3358-2001-2-1033.
Full textBertolino, Antonia, Antonello Calabrò, Eda Marchetti, et al. "Cloud testing automation: industrial needs and ElasTest response." IET Software 14, no. 5 (2020): 553–62. http://dx.doi.org/10.1049/iet-sen.2019.0140.
Full text